Learn about CVE-2021-27462, a critical deserialization vulnerability in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier, allowing remote code execution.
A deserialization vulnerability in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier could allow remote attackers to execute arbitrary commands, posing a critical security threat.
Understanding CVE-2021-27462
This CVE highlights a deserialization vulnerability in FactoryTalk AssetCentre that could be exploited by remote, unauthenticated attackers to execute unauthorized commands.
What is CVE-2021-27462?
The vulnerability exists in how the AosService.rem service verifies serialized data in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier, opening the door for potential remote code execution attacks.
The Impact of CVE-2021-27462
With a CVSS base score of 10 (Critical), this vulnerability has a high impact on confidentiality and availability, without the need for user interaction or privileges, emphasizing the urgency of mitigation.
Technical Details of CVE-2021-27462
This section delves into the specific technical aspects of the CVE.
Vulnerability Description
The vulnerability stems from improper verification of serialized data in FactoryTalk AssetCentre, enabling attackers to run arbitrary commands remotely.
Affected Systems and Versions
Rockwell Automation's FactoryTalk AssetCentre versions up to v10.00 are impacted by this vulnerability.
Exploitation Mechanism
Remote, unauthenticated attackers can exploit this vulnerability by sending malicious serialized data to the AosService.rem service.
Mitigation and Prevention
To address and prevent this vulnerability, immediate actions and long-term security measures need to be implemented.
Immediate Steps to Take
Users are advised to update to FactoryTalk AssetCentre version 11 or above to eliminate the vulnerability. Additionally, leveraging built-in security features and IPsec can enhance protection.
Long-Term Security Practices
Implement software mitigations like running software as a User, not Administrator, and using AppLocker. Ensure the least-privilege principle and network isolation practices are followed for enhanced security.
Patching and Updates
Regularly patch and update FactoryTalk AssetCentre, use trusted software, and restrict network exposure to mitigate risks. Implement secure remote access methods like VPNs and keep them up-to-date.